vulnerability

RHSA-2016:0305: openssl security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Feb 14, 2016
Added
Mar 1, 2016
Modified
Jul 28, 2025

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.A padding oracle flaw was found in the Secure Sockets Layer version 2.0(SSLv2) protocol. An attacker can potentially use this flaw to decryptRSA-encrypted cipher text from a connection using a newer SSL/TLS protocolversion, allowing them to decrypt such connections. This cross-protocolattack is publicly referred to as DROWN. (CVE-2016-0800)Note: This issue was addressed by disabling the SSLv2 protocol by defaultwhen using the 'SSLv23' connection methods, and removing support for weakSSLv2 cipher suites. For more information, refer to the knowledge basearticle linked to in the References section.A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2ciphers that have been disabled on the server. This could result in weakSSLv2 ciphers being used for SSLv2 connections, making them vulnerable toman-in-the-middle attacks. (CVE-2015-3197)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the originalreporters.All openssl users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library must be restarted, orthe system rebooted.

Solutions

redhat-upgrade-opensslredhat-upgrade-openssl-debuginforedhat-upgrade-openssl-develredhat-upgrade-openssl-libsredhat-upgrade-openssl-perlredhat-upgrade-openssl-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.